---------------------------------------------------------------------- Secunia Network Software Inspector 2.0 (NSI) - Public Beta 4 days left of beta period. The 1st generation of the Secunia Network Software Inspector (NSI) has been available for corporate users for almost 1 year and its been a tremendous success. The 2nd generation Secunia NSI is built on the same technology as the award winning Secunia PSI, which has already been downloaded and installed on more than 400,000 computers world wide. Learn more / Download (instant access): http://secunia.com/network_software_inspector_2/ ---------------------------------------------------------------------- TITLE: Debian update for mplayer SECUNIA ADVISORY ID: SA29921 VERIFY ADVISORY: http://secunia.com/advisories/29921/ CRITICAL: Highly critical IMPACT: System access WHERE: >From remote OPERATING SYSTEM: Debian GNU/Linux unstable alias sid http://secunia.com/product/530/ Debian GNU/Linux 4.0 http://secunia.com/product/13844/ DESCRIPTION: Debian has issued an update for mplayer. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system. For more information: SA29515 SOLUTION: Apply updated packages. -- Debian 4.0 (stable) -- Source archives: http://security.debian.org/pool/updates/main/m/mplayer/mplayer_1.0~rc1.orig.tar.gz Size/MD5 checksum: 10286260 815482129b79cb9390904b145c5def6c http://security.debian.org/pool/updates/main/m/mplayer/mplayer_1.0~rc1-12etch3.diff.gz Size/MD5 checksum: 81742 54e2210e0f0eaa596acf6210b050fb50 http://security.debian.org/pool/updates/main/m/mplayer/mplayer_1.0~rc1-12etch3.dsc Size/MD5 checksum: 1265 6ccb62e72b94fa4c797975a36766bb45 Architecture independent packages: http://security.debian.org/pool/updates/main/m/mplayer/mplayer-doc_1.0~rc1-12etch3_all.deb Size/MD5 checksum: 2053074 2a88c44b4fa0e754660948ea7e42b8e4 alpha architecture (DEC Alpha) http://security.debian.org/pool/updates/main/m/mplayer/mplayer_1.0~rc1-12etch3_alpha.deb Size/MD5 checksum: 4707708 444e5067e94888747c62ea39b9ce1938 amd64 architecture (AMD x86_64 (AMD64)) http://security.debian.org/pool/updates/main/m/mplayer/mplayer_1.0~rc1-12etch3_amd64.deb Size/MD5 checksum: 4372894 8f8fb89d21cfc0d8eb028451208f6fb9 arm architecture (ARM) http://security.debian.org/pool/updates/main/m/mplayer/mplayer_1.0~rc1-12etch3_arm.deb Size/MD5 checksum: 4325350 4ee43a3fa256b3e76aae898df3286ace hppa architecture (HP PA RISC) http://security.debian.org/pool/updates/main/m/mplayer/mplayer_1.0~rc1-12etch3_hppa.deb Size/MD5 checksum: 4384442 4a9e2e68d4edcccd7f3bd4b08d1ac4c5 i386 architecture (Intel ia32) http://security.debian.org/pool/updates/main/m/mplayer/mplayer_1.0~rc1-12etch3_i386.deb Size/MD5 checksum: 4421502 c0bfb3da63001b23532ff69750888a8e ia64 architecture (Intel ia64) http://security.debian.org/pool/updates/main/m/mplayer/mplayer_1.0~rc1-12etch3_ia64.deb Size/MD5 checksum: 5842288 8d1fca3a56bbf0faafb39c6ebefd6c92 mips architecture (MIPS (Big Endian)) http://security.debian.org/pool/updates/main/m/mplayer/mplayer_1.0~rc1-12etch3_mips.deb Size/MD5 checksum: 4274728 b51101e7fa8fb0ab197fd84ea9d36c59 mipsel architecture (MIPS (Little Endian)) http://security.debian.org/pool/updates/main/m/mplayer/mplayer_1.0~rc1-12etch3_mipsel.deb Size/MD5 checksum: 4278972 bac174ec794adbcf9f9e4cc44951781e powerpc architecture (PowerPC) http://security.debian.org/pool/updates/main/m/mplayer/mplayer_1.0~rc1-12etch3_powerpc.deb Size/MD5 checksum: 4342252 2a30381673555b1626c407c5cfad56a3 s390 architecture (IBM S/390) http://security.debian.org/pool/updates/main/m/mplayer/mplayer_1.0~rc1-12etch3_s390.deb Size/MD5 checksum: 4163070 81d36ad30bdefeaf77c4531fe4db5cb1 -- Debian GNU/Linux unstable alias sid -- Fixed in version 1.0~rc2-10. ORIGINAL ADVISORY: http://lists.debian.org/debian-security-announce/2008/msg00123.html OTHER REFERENCES: SA29515: http://secunia.com/advisories/29515/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------